Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-15859

Опубликовано: 21 июл. 2020
Источник: debian
EPSS Низкий

Описание

QEMU 4.2.0 has a use-after-free in hw/net/e1000e_core.c because a guest OS user can trigger an e1000e packet with the data's address set to the e1000e's MMIO address.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qemufixed1:5.2+dfsg-1package

Примечания

  • Proposed patch: https://lists.gnu.org/archive/html/qemu-devel/2020-07/msg05895.html

  • https://bugs.launchpad.net/qemu/+bug/1886362

  • https://git.qemu.org/?p=qemu.git;a=commit;h=22dc8663d9fc7baa22100544c600b6285a63c7a3

EPSS

Процентиль: 5%
0.00026
Низкий

Связанные уязвимости

CVSS3: 3.3
ubuntu
почти 5 лет назад

QEMU 4.2.0 has a use-after-free in hw/net/e1000e_core.c because a guest OS user can trigger an e1000e packet with the data's address set to the e1000e's MMIO address.

CVSS3: 3.8
redhat
почти 5 лет назад

QEMU 4.2.0 has a use-after-free in hw/net/e1000e_core.c because a guest OS user can trigger an e1000e packet with the data's address set to the e1000e's MMIO address.

CVSS3: 3.3
nvd
почти 5 лет назад

QEMU 4.2.0 has a use-after-free in hw/net/e1000e_core.c because a guest OS user can trigger an e1000e packet with the data's address set to the e1000e's MMIO address.

CVSS3: 3.3
msrc
почти 5 лет назад

Описание отсутствует

CVSS3: 3.3
github
около 3 лет назад

QEMU 4.2.0 has a use-after-free in hw/net/e1000e_core.c because a guest OS user can trigger an e1000e packet with the data's address set to the e1000e's MMIO address.

EPSS

Процентиль: 5%
0.00026
Низкий